Hello I wanted to know if there are any hidden backdoors in puppy?
I'm concerned about this because Windows has build in NSA backdoors
The famous NSA backdoor in all windows systems.
http://en.wikipedia.org/wiki/NSAKEY

They can see what you are doing!

Could the developer tell that puppy contains no backdoors?
I know linux is open source but it contains to much code to research for backdoors.

Puppy gets packages from pet but has it got build in package check md5?
So that someone couldn't change the package and hide coded backdoors?
thanks.

No Linux kernel back doors are known of.
They have the same level of existence as the flying spaghetti monster
Windows and to some extent BSD and Android collude with closed and spook sponsored systems.
Penguins are made of a different grade of fish.

The dreaded COOKIES on many web sights are embedded into your
PC without your knowledge that can find out your password, name
and web sights you have visited.

Microsoft admitted that Windows 98 generates a fingerprint unique
to identify you known as GUID.
This GUID is generally hidden in Office 97 Word, Excel, and Power
Point programs.
What makes this most disturbing is every time you visit www.microsoft.com, this program scans your PC automatically
and gathers information without your knowledge.

It's not enough that Intel & Microsoft make billions in sales to it's customers, but even after they have dipped into your pocket they
now have the technology to dip into your privacy and your PC
without you even knowing it. "

" When programmers get bored out while developping a program,
they tend to amuse themselves by hiding games or scroling credits somewhere within their programs. These hidden sections of a program are commonly referred to as Easter eggs, and can be very fun for the programmer to hide, as well as for us to find. "

The simple4 fact is that its actually law on a federal level that every popular software and hardware communications device must have an easily accessible backdoor so that law enforcement can access this with the minimum of fuss.

This includes Windows itself, IE, firefox etc
i do not know if the linux kernel itself has this but every other software that is used for communicating has and this includes:

skype, msn, facebook etc etc etc

When something becomes popular and is widely used its illegal not to have a backdoor.

Even the TOR network lets law enforcement monitor your computer.
Dont rely on ssl encryption either. There exists a method for law enforcement to access your computer regardless of encryption, we are talking about backdoors in a way that is similar to open ports listening on your computer and law enforcement can connect to these. Not only is something like TOR compromised, it is beside the point, completely. This is because it doesnt matter what proxy you use, there is most likely a connection that allows direct access to and monitoring of your computer, they will know everything you do as all activity can be tracked on your computer itself at the isp or between you and the isp or they will monitor via a direct conenction to your computer. If you are connected to the internet at all, you can be sure that if they want to, law enforcement can monitor everything you do, whatever data ends up on your computer can be monitored, whatever you view on your screen can be seen.

There are also things in pop culture that the authorities encourage, like the lame idea that your webcam isnt active unless there is a light on next to it. Also all mobile phones microphones can be enabled without the user knowing, with the phone turned off. The only way to get around this is to take the batteries out.

Then there are the "leaks" that are actually publicized like apparently a entire list of MS backdoors was leaked a year ago or so. Notice a "LIST" there i not just one backdoor on your windows.

its kinda like ubuntu getting so big it cant include semi legal codecs in its OS, while less popular OSes can. When a hardware or software that is used for communication gets popular enough, there comes a time when it is required by law to facilitate an entry point for law enforcement. The company or individuals will be informed by whatever party that handles these things and they must work with whoever to incorporate the backdoor and ofcause be involved in a non disclosure agreement, the software or hardware producer cannot warn their customers.

Puppy can show such a things on the piece of paper. If there are a windows in the building why not to see these elements of construction in non-dangerous representation... If the windows are everywhere then some personages destroy the chosen windows for making a doors._________________

I don't know why laboratories are named a hospitals.

The alive personage is like a tea bag with granules of unknown density inside, at that one the packet was made of organic material and was placed in the evaporated liquid or liquid.

The simple4 fact is that its actually law on a federal level that every popular software and hardware communications device must have an easily accessible backdoor so that law enforcement can access this with the minimum of fuss.
...
Even the TOR network lets law enforcement monitor your computer.
...
There exists a method for law enforcement to access your computer regardless of encryption, we are talking about backdoors in a way that is similar to open ports listening on your computer and law enforcement can connect to these.

The simple4 fact is that its actually law on a federal level that every popular software and hardware communications device must have an easily accessible backdoor so that law enforcement can access this with the minimum of fuss.

This includes Windows itself, IE, firefox etc
i do not know if the linux kernel itself has this but every other software that is used for communicating has and this includes:

skype, msn, facebook etc etc etc

When something becomes popular and is widely used its illegal not to have a backdoor.

Even the TOR network lets law enforcement monitor your computer.
Dont rely on ssl encryption either. There exists a method for law enforcement to access your computer regardless of encryption, we are talking about backdoors in a way that is similar to open ports listening on your computer and law enforcement can connect to these. Not only is something like TOR compromised, it is beside the point, completely. This is because it doesnt matter what proxy you use, there is most likely a connection that allows direct access to and monitoring of your computer, they will know everything you do as all activity can be tracked on your computer itself at the isp or between you and the isp or they will monitor via a direct conenction to your computer. If you are connected to the internet at all, you can be sure that if they want to, law enforcement can monitor everything you do, whatever data ends up on your computer can be monitored, whatever you view on your screen can be seen.

There are also things in pop culture that the authorities encourage, like the lame idea that your webcam isnt active unless there is a light on next to it. Also all mobile phones microphones can be enabled without the user knowing, with the phone turned off. The only way to get around this is to take the batteries out.

Then there are the "leaks" that are actually publicized like apparently a entire list of MS backdoors was leaked a year ago or so. Notice a "LIST" there i not just one backdoor on your windows.

its kinda like ubuntu getting so big it cant include semi legal codecs in its OS, while less popular OSes can. When a hardware or software that is used for communication gets popular enough, there comes a time when it is required by law to facilitate an entry point for law enforcement. The company or individuals will be informed by whatever party that handles these things and they must work with whoever to incorporate the backdoor and ofcause be involved in a non disclosure agreement, the software or hardware producer cannot warn their customers.

I see someone who know's what I'm trying to say, what you say is all true!

The government won't tell us!! see here...

https://www.eff.org/deeplinks/2010/09/government-seeks

If someone is using truecrypt don't use it! it contains backdoors like many other software, use only open source applications.

The simple4 fact is that its actually law on a federal level that every popular software and hardware communications device must have an easily accessible backdoor so that law enforcement can access this with the minimum of fuss.
...
Even the TOR network lets law enforcement monitor your computer.
...
There exists a method for law enforcement to access your computer regardless of encryption, we are talking about backdoors in a way that is similar to open ports listening on your computer and law enforcement can connect to these.

Please provide references.

about TOR?
goto their site, read the info. They actually tell you they must cooperate with law enforcement and also says that they are not allowed to tell users or post on their site by what means the network is being monitored and if and when monitoring is happening.

it doesnt matter what so call encryption or proxy you use at all, when your system is directly accessible, when this is happening, dont think that bouncing off of 40 servers to visit a site actually conceals the identity of your computer or stops law enforcement tracking you. This is backwards thinking if you trust this kind of thing, just because its not your IP going to a site doesnt mean you cant be tracked, this only makes it more difficult for people monitoring a specific site you vist to find your IP. This is the only protection and this is useless when law enforcement is involved as if you are under their watchful eye for some reason, its all done by accessing your system directly. Whatever keystrokes you type or sites you visit, whatever appears on your screen, everything you do on your computer while connected to the internet is easily monitored.

you can use 50 proxies if you like, makes no difference when they can actually view the contents of your browser on your system.

about TOR?
goto their site, read the info. They actually tell you they must cooperate with law enforcement and also says that they are not allowed to tell users or post on their site by what means the network is being monitored and if and when monitoring is happening.

Please tell us where on their site. All I can find is information like this (From the FAQ), which seems to indicate there is no such problem:

Quote:

I have a compelling reason to trace a Tor user. Can you help?

There is nothing the Tor developers can do to trace Tor users. The same protections that keep bad people from breaking Tor's anonymity also prevent us from figuring out what's going on.

Some fans have suggested that we redesign Tor to include a backdoor. There are two problems with this idea. First, it technically weakens the system too far. Having a central way to link users to their activities is a gaping hole for all sorts of attackers; and the policy mechanisms needed to ensure correct handling of this responsibility are enormous and unsolved. Second, the bad people aren't going to get caught by this anyway, since they will use other means to ensure their anonymity (identity theft, compromising computers and using them as bounce points, etc).

This ultimately means that it is the responsibility of site owners to protect themselves against compromise and security issues that can come from anywhere. This is just part of signing up for the benefits of the Internet. You must be prepared to secure yourself against the bad elements, wherever they may come from. Tracking and increased surveillance are not the answer to preventing abuse.

But remember that this doesn't mean that Tor is invulnerable. Traditional police techniques can still be very effective against Tor, such as investigating means, motive, and opportunity, interviewing suspects, writing style analysis, technical analysis of the content itself, sting operations, keyboard taps, and other physical investigations. The Tor Project is also happy to work with everyone including law enforcement groups to train them how to use the Tor software to safely conduct investigations or anonymized activities online.

Quote:

What are Entry Guards?

Tor (like all current practical low-latency anonymity designs) fails when the attacker can see both ends of the communications channel. For example, suppose the attacker controls or watches the Tor relay you choose to enter the network, and also controls or watches the website you visit. In this case, the research community knows no practical low-latency design that can reliably stop the attacker from correlating volume and timing information on the two sides.

So, what should we do? Suppose the attacker controls, or can observe, C relays. Suppose there are N relays total. If you select new entry and exit relays each time you use the network, the attacker will be able to correlate all traffic you send with probability (c/n)2. But profiling is, for most users, as bad as being traced all the time: they want to do something often without an attacker noticing, and the attacker noticing once is as bad as the attacker noticing more often. Thus, choosing many random entries and exits gives the user no chance of escaping profiling by this kind of attacker.

The solution is "entry guards": each Tor client selects a few relays at random to use as entry points, and uses only those relays for her first hop. If those relays are not controlled or observed, the attacker can't win, ever, and the user is secure. If those relays are observed or controlled by the attacker, the attacker sees a larger fraction of the user's traffic — but still the user is no more profiled than before. Thus, the user has some chance (on the order of (n-c)/n) of avoiding profiling, whereas she had none before.

Quote:

Is there a backdoor in Tor?

There is absolutely no backdoor in Tor. Nobody has asked us to put one in, and we know some smart lawyers who say that it's unlikely that anybody will try to make us add one in our jurisdiction (U.S.). If they do ask us, we will fight them, and (the lawyers say) probably win.